Ahorra un 25 % (o incluso más) en tus costes de Kafka | Acepta el reto del ahorro con Kafka de Confluent
Change data capture is a popular method to connect database tables to data streams, but it comes with drawbacks. The next evolution of the CDC pattern, first-class data products, provide resilient pipelines that support both real-time and batch processing while isolating upstream systems...
Learn how the latest innovations in Kora enable us to introduce new Confluent Cloud Freight clusters, which can save you up to 90% at GBps+ scale. Confluent Cloud Freight clusters are now available in Early Access.
Learn how to contribute to open source Apache Kafka by writing Kafka Improvement Proposals (KIPs) that solve problems and add features! Read on for real examples.
Operating Kafka at scale can consume your cloud spend and engineering time. And operating everyday tasks like scaling or deploying new clusters can be complex and require dedicated engineers. This post focuses on how Confluent Cloud is 1) Resource Efficient, 2) Fully Managed, and 3) Complete.
Data streaming capabilities are transforming everything, from allowing you to see when your ride will arrive to powering curbside pickups of groceries. The immediacy and personalization of those commercial experiences are fast becoming the expectations when using public services and healthcare, too.
Companies in nearly every industry are using Apache Kafka to harness their streaming data and deliver rich customer experiences and real-time business insights. In fact, Kafka has become so widely accepted as the de facto technology for data streaming, that it’s now used by over 70% of the Fortune
The blog introduces Confluent Platform 7.4 and its key features, including enhancing scalability, increasing architectural simplicity, accelerating time to market, reducing ops burden, and ensuring high-quality data streams. It also covers what's new in Apache Kafka 3.4.
In part 2 of our blog series on understanding and optimizing your Kafka costs, we dive into how to estimate costs stemming from the development and operations personnel needed to self-manage Kafka.
Real-time fraud prevention has become a critical capability in the financial services industry. That’s especially true for digital-native banks like EVO Banco, which can be particularly vulnerable to common methods of financial fraud.
This blog post discusses the two generals problems, how it impacts message delivery guarantees, and how those guarantees would affect a futuristic technology such as teleportation.
Hi there, it’s me, Danica Fine, your friendly neighborhood Kafka Summit London Program Committee Chair. Kafka Summit London 2023 is in just over two weeks, and I’ll be joining our incredible community members at the ExCeL in London to talk all things Apache Kafka® over two jam-packed days.
It's hard to properly calculate the cost of running Kafka. In part 1 of 4, learn to calculate your Kafka costs based on your infrastructure, networking, and cloud usage.
When Steven Zhang graduated from college in 2019, he, was searching for intellectually-stimulating work. That search led him to Confluent. Four years in, Steven currently works as a senior software engineer in the Stream Processing and Analytics organization
Shaun Clowes, Confluent’s Chief Product Officer since December of last year, will tell you data is the lifeblood of modern organizations. But he will also tell you he isn’t a big fan of the word “data.”
Capturing tech trends has become a bit tricky these days: whatever industry you’re in, uncertainty abounds. Planning has become harder, but businesses are finding new ways to innovate and respond quickly to fast-changing market conditions.
If you’ve been working with Kafka Streams and have seen an “unknown magic byte” error, you might be wondering what a magic byte is in the first place, and also, how to resolve the error. This post explains the answers to both questions.
The National Cybersecurity Strategy released by the Biden-Harris administration in March 2023 was designed to provide direction for developing and evolving the digital ecosystem that will become a key line of defense for the security of our nation